Sciweavers

186 search results - page 33 / 38
» Disjunctions and Inheritance in the Context Feature Structur...
Sort
View
EL
2008
166views more  EL 2008»
13 years 7 months ago
The digital library as an enterprise: the Zachman approach
Purpose: Examines the needs of digital library stakeholders and how a collaborative digital library might be designed to meet these needs. The collaborative digital library has be...
Abdullah Abrizah, A. N. Zainab
IOR
2008
137views more  IOR 2008»
13 years 7 months ago
Optimal Joint Inventory and Transshipment Control Under Uncertain Capacity
In this paper, we address the optimal joint control of inventory and transshipment for a firm that produces in two locations and faces capacity uncertainty. Capacity uncertainty (...
Xinxin Hu, Izak Duenyas, Roman Kapuscinski
CISC
2009
Springer
174views Cryptology» more  CISC 2009»
13 years 5 months ago
Algebraic Side-Channel Attacks
Abstract. In 2002, algebraic attacks using overdefined systems of equations have been proposed as a potentially very powerful cryptanalysis technique against block ciphers. However...
Mathieu Renauld, François-Xavier Standaert
WWW
2007
ACM
14 years 8 months ago
Web object retrieval
The primary function of current Web search engines is essentially relevance ranking at the document level. However, myriad structured information about real-world objects is embed...
Zaiqing Nie, Yunxiao Ma, Shuming Shi, Ji-Rong Wen,...
TROB
2002
244views more  TROB 2002»
13 years 7 months ago
Distributed surveillance and reconnaissance using multiple autonomous ATVs: CyberScout
The objective of the CyberScout project is to develop an autonomous surveillance and reconnaissance system using a network of all-terrain vehicles. In this paper, we focus on two f...
Mahesh Saptharishi, C. Spence Oliver, Christopher ...